Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0340 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 65 |
ÇѱÛÇ¥Áظí | »çÀ̹ö °ø°Ý ´ëÀÀÀ» À§ÇÑ Áß¼Ò±â¾÷ Á¤º¸½Ã½ºÅÛ ¹é¾÷ Áöħ | ||
¿µ¹®Ç¥Áظí | Small or Medium Enterprise Business Information system backup guideline for cyber attack response | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº ¹é¾÷ Á¶Á÷À» Á¤ÀÇÇÏ°í, ¹é¾÷ Á¶Á÷ÀÌ Ã¼°èÀûÀ¸·Î ¹é¾÷À» ¼öÇàÇÒ ¼ö ÀÖµµ·Ï ¹é¾÷ °ü¸® ÀýÂ÷¸¦ ¼³¸íÇÑ´Ù. ¶ÇÇÑ, ¾Ç¼ºÄÚµå, ·£¼¶¿þ¾î °¨¿° µî ħÇØ»ç°í ¹ß»ý½Ã ½Å¼ÓÇÑ ´ëÀÀ¿¡ ÇÊ¿äÇÑ ÀýÂ÷¸¦ Á¦½ÃÇÑ´Ù. ¹é¾÷½Ã½ºÅÛ ±¸¼º¿¡¼´Â ±â¾÷ÀÌ ÀϹÝÀûÀ¸·Î »ç¿ëÇÒ ¼ö ÀÖ´Â ¹é¾÷ ±¸¼º°ú µ¥ÀÌÅ͸¦ ¾ÈÀüÇÏ°Ô º¸°üÇϱâ À§ÇÑ ½Ã½ºÅÛ ±¸¼º ¹æ¹ýÀ» ¼³¸íÇÑ´Ù. ¹é¾÷ Á¤Ã¥Àº ¹é¾÷ ¼öÇà ½Ã ÇÊ¿äÇÑ Á¤Ã¥°ú ÀýÂ÷¸¦ Á¦½ÃÇÏ°í ¸¶Áö¸·À¸·Î ¹é¾÷ µ¥ÀÌÅ͸¦ »çÀ̹ö °ø°ÝÀ¸·ÎºÎÅÍ ¿¹¹æÇϱâ À§ÇØ ÇÊ¿äÇÑ º¸¾È üũ¸®½ºÆ®¿¡ ´ëÇÏ¿© ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard defines backup organization and explaines backup management procedure so that backup organization can systematically perform backup. It also provides the procedures for rapid cyber incident response.
The main contents of the backup system configuration chapter describes the general backup system and backup system configuration method to prevent from cyber attacks. The backup policy chapter describes the remote backup policy for various backup methods. Finally, It describes the security checklists of backup system necessary to prevent cyber attacks. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0340.pdf |